While 2021 isn’t quite over yet, at Yubico, we took a moment to reflect on many of the changes and impacts that have happened in the cybersecurity industry. This year has marked some of the biggest security breaches in history including the SolarWinds and Colonial Pipeline hacks. And with these cybersecurity attacks, we’ve seen: Action […]
Read moreThe US Government’s Office of Management and Budget recently issued its Zero Trust Strategy, which would require that Federal agencies only use phishing-resistant multi-factor authentication. This strategy comes on the heels of a number of other actions from the Executive Office of the President including a cybersecurity executive order in May. This executive order directed […]
Read moreThe deadline is looming for federal agencies to implement impersonation-resistant multi-factor authentication (MFA), just one of the new stronger security requirements under President Biden’s new cybersecurity executive order (EO 14028). The EO puts security front and center to address some of the worst cyber attacks against the federal government, setting up new federal compliance expectations […]
Read moreLearn how DOD approved hardware security keys such as the YubiKey are ideal to fill PIV and CAC related authentication gaps across the federal government, and meet the MFA mandate in the Biden Executive Order 14028.
Read moreWith the recent number of attacks that have had significant impact on critical systems, a new executive order on improving the nation’s cybersecurity has been released, covering many key areas that need to be addressed to protect critical digital infrastructure. This is one of the most detailed U.S. executive orders on cybersecurity and we welcome […]
Read moreLearn the five key strong authentication best practices that can support your organization’s zero trust security initiatives
Read moreLearn how Centrify, Ping Identity, and Yubico come together to provide insights on how their joint solutions can help address a zero trust security model
Read moreThe Key to Trust with Zero Compromise.YubiKey: Not all authentication is created equal The Zero Trust framework is a journey, and implies that an organization should trust no individual or thing unless properly verified before being given access to the network and data. Strong authentication is a foundational aspect of that journey, enabling phishing-resistant user […]
Read moreZero Trust has truly come of age in the last 12 months, but there are misconceptions relating to what it is, where to start on the journey, and how organizations can achieve a Zero Trust environment. To further explore this topic, we recently sat down with John Kindervag, the creator of Zero Trust and current […]
Read more